Sectrio

Author name: Prayukth K V

Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defense tactics at close quarters.

prayukth
Why-cyberspace-remains-largely-unaffected-amidst-ongoing-geopolitical-turmoil

Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil

The lack of any large cyber incidents doesn’t mean things are still deep under. Instead, this could well be the lull before a cyberstorm.     Earlier this week, Iran-linked APT group Charming Kitten (aka Ballistic Bobcat APT, APT35, and Phosphorus) initiated a fresh cyber espionage campaign targeting 14 countries across the globe. The objective of these […]

Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil Read More »

Fundamentals of attack path analysis in an OT environment

Fundamentals of attack path analysis in an OT environment

At its core, an attack path analysis presents a powerful visual and impactful representation covering a potential path that cyber threat actors or malicious payloads may tread to breach asset or network targets. The benefits justify resource and attention investments in an APA exercise. In addition to helping disrupt the changes of a successful cyberattack,

Fundamentals of attack path analysis in an OT environment Read More »

Looking-ahead-of-CEA-guidelines-to-secure-the-power-sector-in-India

Looking ahead of CEA guidelines to secure the power sector in India

India’s Central Electricity Authority (CEA) issued the Cyber Security in Power Sector Guidelines 2021 in October 2021. The comprehensive guidelines are intended to help all power sector entities in India take measured steps to improve their overall cybersecurity posture and protect critical infrastructure from cyber attacks through specific interventions. The guidelines cover a wide gamut

Looking ahead of CEA guidelines to secure the power sector in India Read More »

Understanding the significance of the latest “cyberattack” on AIIMS

Deciphering the latest attack on AIIMS    

In the latest edition of our threat landscape report, Sectrio’s threat researchers had done a comprehensive analysis of the Indian cyber threat landscape, the actors, tactics, malware, and enablers. This report also highlighted the alarming levels of sophistication and maturity demonstrated by state-backed hackers that are targeting Indian critical infrastructure, businesses, and financial services infrastructure.

Deciphering the latest attack on AIIMS     Read More »

Essential OT security practices 12 effective measures you can implement today

Essential security practices in OT control systems

Operational Technology (OT) security controls include the measures, workflows and procedures put in place to protect various OT systems from cyber threats. OT systems are used to control, run and monitor critical infrastructure, such as those in power plants, water treatment facilities, and transportation systems. As these systems become increasingly interconnected, they turn more vulnerable

Essential security practices in OT control systems Read More »

OT-Patch-Management-Program-10-Best-Practices-from-Sectrio

Best practices for an OT patch management program

Having an OT Patch management program is critical from a security and operational perspective for industries in manufacturing or critical infrastructure. A comprehensive patch management program is an integral part of an organization’s overall risk management (and mitigation) strategy. It not only helps identify and prioritize vulnerabilities, and assess their potential impact on operations but

Best practices for an OT patch management program Read More »

Setting up an OT-ICS Incident Response Plan (IRP)

Setting up an OT-ICS Incident Response Plan 

Operational Technology (OT) and Industrial Control System (ICS) are the backbones of critical infrastructure that controls and monitor physical processes. They are used in a wide range of industries, including energy, manufacturing, and transportation. OT and ICS systems are increasingly becoming targets of cyberattacks. In 2020, the Colonial Pipeline was shut down for six days

Setting up an OT-ICS Incident Response Plan  Read More »

AI-powered cyberattacks are evolving at a frightening pace

AI-powered cyberattacks are evolving at a frightening pace

The recently released IoT and OT threat landscape assessment and analysis report from Sectrio has revealed many previously unknown aspects of AI’s use in conceptualizing and executing cyberattacks. This report presents a detailed view of the models and techniques that hackers use to deploy AI for improving targeting, conducting scans, and automating the modification of

AI-powered cyberattacks are evolving at a frightening pace Read More »

Scroll to Top